Multipath key establishment for wireless sensor networks using Just-Enough Redundancy Transmission

被引:19
作者
Deng, Jing [1 ]
Han, Yunghsiang S. [2 ]
机构
[1] Univ New Orleans, Dept Comp Sci, New Orleans, LA 70148 USA
[2] Natl Taiwan Univ, Grad Inst Commun Engn, Taipei 237, Taiwan
关键词
wireless sensor networks; key predistribution; security; secret link key; symmetric key; maximum-distance separable codes;
D O I
10.1109/TDSC.2007.70233
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors prior to deployment. After deployment, each sensor tries finding a common key shared by itself and each of its neighbors to establish a link key to protect the wireless communication between themselves. One intrinsic disadvantage of such techniques is that some neighboring sensors do not share any common key. In order to establish a link key among these neighbors, a multihop secure path may be used to deliver the secret. Unfortunately, the possibility of sensors being compromised on the path may render such an establishment process insecure. In this work, we propose and analyze the Just-Enough Redundancy Transmission (JERT) scheme that uses the powerful Maximum-Distance Separable (MDS) codes to address the problem. In the JERT scheme, the secret link key is encoded in (n, k) MDS code and transmitted through multiple multihop paths. To reduce the total information that needs to be transmitted, the redundant symbols of the MDS codes are transmitted only if the destination fails to decode the secret. The JERT scheme is demonstrated to be efficient and resilient against node capture. One salient feature of the JERT scheme is its flexibility of trading transmission for lower information disclosure.
引用
收藏
页码:177 / 190
页数:14
相关论文
共 29 条
[1]  
Çamtepe SA, 2004, LECT NOTES COMPUT SC, V3193, P293
[2]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[3]  
Clark G.C., 1981, Error-Correction Coding for Digital Communications
[4]  
DENG J, 2005, P INT C MOB AD HOC S, P732
[5]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[6]  
Du W, 2003, P 10 ACM C COMP COMM, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[7]  
Du WL, 2004, IEEE INFOCOM SER, P586
[8]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[9]   An application-specific protocol architecture for wireless microsensor networks [J].
Heinzelman, WB ;
Chandrakasan, AP ;
Balakrishnan, H .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2002, 1 (04) :660-670
[10]  
HUANG D, 2005, P 19 IEEE INT PAR DI, P240